Beyond stack inspection: A unified access-control and information-flow security model

Marco Pistoia, Anindya Banerjee, David A. Naumann

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

36 Scopus citations

Abstract

Modern component-based systems, such as Java and Microsoft .NET Common Language Runtime (CLR), have adopted Stack-Based Access Control (SBAC). Its purpose is to use stack inspection to verify that all the code responsible for a security-sensitive action is sufficiently authorized to perform that action. Previous literature has shown that the security model enforced by SBAC is flawed in that stack inspection may allow unauthorized code no longer on the stack to influence the execution of security-sensitive code. A different approach, History-Based Access Control (HBAC), is safe but may prevent authorized code from executing a security-sensitive operation if less trusted code was previously executed. In this paper, we formally introduce Information-Based Access Control (IBAC), a novel security model that verifies that all and only the code responsible for a security-sensitive operation is sufficiently authorized. Given an access-control policy α, we present a mechanism to extract from it an implicit integrity policy, and we prove that IBAC enforces. Furthermore, we discuss large-scale application code scenarios to which IBAC can be successfully applied.

Original languageEnglish
Title of host publicationProceedings - S and P 2007
Subtitle of host publication2007 IEEE Symposium on Security and Privacy, SP'07
Pages149-163
Number of pages15
DOIs
StatePublished - 2007
EventS and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07 - Berkeley, CA, United States
Duration: 20 May 200723 May 2007

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
ISSN (Print)1081-6011

Conference

ConferenceS and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
Country/TerritoryUnited States
CityBerkeley, CA
Period20/05/0723/05/07

Fingerprint

Dive into the research topics of 'Beyond stack inspection: A unified access-control and information-flow security model'. Together they form a unique fingerprint.

Cite this